If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Sniffjoke 0.4.1 - a sniffer evasion tool (Anti-IDS/IPS)

Sniffjoke 0.4.1 - a sniffer evasion tool (Anti-IDS/IPS)SniffJoke (Sj) implements a set of anti sniffing technology itself, but begins developed as a modular framework.

Will easily be supported by a security community that want to exploit and explore sniffing faults. SniffJoke is an application for Linux that handle transparently your TCP connection, delaying, modifying and injecting fake packets inside your transmission, make them almost impossible to be correctly read by a passive wiretapping technology (IDS or sniffer). An internet client running SniffJoke injects in the transmission flow some packets able to seriously disturb passive analysis like sniffing, interception and low level information theft. No server supports needed!

Sj in the 0.4 release, hacks & mangles your network at layers 3 and 4. But with further development of plugins, you could well make all protocols at every layer scrambled, so that they can’t be detected by network sniffers.
This is the official change log:

Re: Sniffjoke 0.4.1 - a sniffer evasion tool (Anti-IDS/IPS)

I thought the best way to evade sniffing was to encrypt all of your traffic. Yes I know about man in the middle attacks, and presenting clients with false ssl certs so you decrypt the clients traffic. Lets take ssh for example, if you used public/private keys and already exchanged keys with the ssh server before the man in the middle attack began you should be fine. Please correct me if I am wrong.